SEC+ Revision Questions Securing the Network Infrastructure Flashcards
You are a guest at a hotel offering free Wi-Fi Internet access to guests. You connect to the wireless network at full signal strength and obtain a valid TCP/IP configuration. When you try to access Internet web sites, a web page displays instead asking for a code before allowing access to the Internet. What type of network component is involved in providing this functionality?
A. DHCP server
B. NAT
C. Proxy server
D. Switch
C. Proxy server
You are configuring a wireless router at a car repair shop so that waiting customers can connect to the Internet. You want to ensure wireless clients can connect to the Internet but cannot connect to internal computers owned by the car repair shop. Where should you plug in the wireless router?
A. LAN
B. Port 24 on the switch
C. Port 1 on the switch
D. DMZ
D. DMZ
What will detect network or host intrusions and take actions to prevent the intrusion from succeeding?
A. IPS
B. IDS
C. IPSec
D. DMZ
A. IPS
What technology uses a single external IP address to represent many computers on an internal network?
A. IPSec
B. DHCP
C. NAT
D. NIDS
C. NAT
You must purchase a network device that supports content filtering and virus defense for your LAN. What should you choose?
A. NAT router
B. HIPS
C. Web security gateway
D. Packet filtering firewall
C. Web security gateway
You have been asked to somehow separate Engineering departmental network traffic from Accounting departmental traffic because of a decrease in network throughput. What should you use?
A. VLAN
B. DMZ
C. NAT
D. VPN
A. VLAN
Based on the following LAN firewall rule set, choose the best description: Allow inbound TCP 3389
Allow outbound TCP 80 Allow outbound TCP 443
A. LAN users can connect to external FTP sites. External users can use RDP to connect to LAN computers.
B. LAN users can connect to external SMTP servers. External users can use LDAP to connect to LAN computers.
C. LAN users can connect to external web servers. External users can use RDP to connect to LAN computers.
D. LAN users can connect to external proxy servers. External users can use IPSec to connect to LAN computers.
C. LAN users can connect to external web servers. External users can use RDP to connect to LAN computers.
Which tool would allow you to capture and view network traffic?
A. Vulnerability scanner
B. Port scanner
C. Protocol analyser
D. NAT
C. Protocol analyser
You are reviewing router configurations to ensure they comply with corporate security policies. You notice the routers are configured to load their configurations using TFTP and also that TCP port 22 is enabled. What security problem exists with these routers?
A. Telnet should be disabled.
B. Telnet should have a password configured.
C. TFTP is an insecure protocol.
D. Telnet should limit concurrent logins to 1.
C. TFTP is an insecure protocol.
A router must be configured to allow traffic only from certain hosts. How can this be accomplished?
A. ACL
B. Subnet
C. Proxy server
D. NAT
A. ACL
Which technologies allow analysis of network traffic? (Choose two.)
A. Port scanner
B. Sniffer
C. DMZ
D. NIDS
B. Sniffer
&
D. NIDS
Sylvia’s workstation has been moved to a new cubicle. On Monday morning, Sylvia reports that even though the network card is plugged into the network jack, there is no link light on the network card. What is the problem?
A. The workstation has an APIPA address. Issue the ipconfig / renew command.
B. The default gateway has not been set.
C. Sylvia must first log on to the domain.
D. Since the MAC address has changed, switch port security has disabled the port.
D. Since the MAC address has changed, switch port security has disabled the port.
You need a method of authenticating Windows 7 workstations before allowing local LAN access. What should you use?
A. VPN concentrator
B. Router
C. 802.1x-compliant switch
D. Proxy server
C. 802.1x-compliant switch
An attacker sends thousands of TCP SYN packets with unreachable source IP addresses to a server. After consuming server resources with this traffic, legitimate traffic can no longer reach the server. What can prevent this type of attack?
A. Packet filtering firewall
B. Proxy server
C. Antivirus software
D. SYN flood protection
D. SYN flood protection
A junior IT employee links three network switches together such that each switch connects to the two others. As a result, the network is flooded with useless traffic. What can prevent this situation?
A. Web application firewall
B. Loop protection
C. SYN flood guard
D. Router ACL
B. Loop protection